Southern University, USA
College of Business
Abstract The advent of wireless communication technology has brought new innovations as well as challenges to telecommunication. Consequently, the use of handheld devices such as mobile handsets, powered by the Global System for Mobile... more
Abstract-In an age when information exchange has been made more mobile by the advent and advances in internet technology, information security is assuming a worrisome dimension. Hacking, phishing, eavesdropping, scamming and a host of... more
Resumen: The migration from print to digital media for the storage, retrieval, and communication of all types of data has influenced the way people source for research materials. A questionnaire was administered to evaluate users' views... more
Abstract In this article we investigated the level of consumption of Internet pornography among children and teenagers of primary and secondary school age in Southwestern Nigeria. Two research instruments titled “Children/Teenagers... more
ABSTRACT Apart from contending with the problems of intrusion into enterprise information platforms, organizations are also faced with the consequences of unguided access and usage of social engineering website in the workplace. We... more
Abstract This paper investigates the prevalence of cybercrimes (caled 'sakawa') in Ghana and examines its forms and implications. Using qualitative approach, we explore efforts by organizations and government agencies in Ghana towards... more
ABSTRACT: A review of the existing work on software complexity metrics shows the use of McCabe's cyclomatic number, Halstead's software science, the number of program statements, the Oviedo's dataflow complexity graph. None of these... more
ABSTRACT Following the exponential and unprecedented rate at which commercial databases are growing, it becomes imperative to mine the data to provide guidance to investors for selecting portfolios which will afford them good income and... more
ABSTRACT Broadcast Television has been and still is the basic and the most popular means of television entertainment in Nigeria. In Nigeria today, there is an increasing number of television networks, eg: AIT, NTA, Channels, BCOS, etc,... more
Abstract As efforts at combating electronic mail Spam rages on, users and technocrats are becoming fuzzy in their judgment of what actually constitute Spam. Most Spam filters depend on routing information, sender addresses, message title,... more
Abstract. Designing an accurate virus detection system requires a careful selection of the appropriate techniques, which would help characterize the attributes that would identify a virus infected file. This paper uses deterministic... more
Abstract—This study was undertaken to assess the visual symptoms complaints among computer users in Industrially Developing Countries (IDCs) using the University of Benin, Benin City, Nigeria, as a case study. The focus was on Cathode-Ray... more
Abstract: The malaise of electronic spam mail that solicit illicit partnership using bogus business proposals (popularly called 419 mails) remained unabated on the internet despite concerted efforts. In addition to these are the emergence... more
Abstract The objective of connection admission control (CAC) is to keep the network load moderate to achieve a performance objective associated with Quality of Service (QoS). Cell Loss Ratio (CLR), a key QoS parameter in ATM networks, is... more
Abstract Using a combination of ethnographic study of criminals and victims in combination with secondary published text that highlights cyber deception and theft we seek to determine the schemes and plots of cyber deception in Ghana. We... more
ABSTRACT One of the major impetus for the proponents of cashless societies is the convenience of transacting businesses using digital financial containers (debit/credit/ATM cards). However, challenges with user privacy, network downtime... more
Abstract The research proposes an improvement to CAPTCHA DC algorithms by introducing a unifying components that assists DC algorithms to effectively detect the density of DC in particular CAPTCHAs and determine the maximum and minimum... more